The development
of ICT has made it possible to store large amount of data in the virtual world
and make communication through it. At the same time, computer crimes and abuse
of data, privacy violations, pornography are increasing.
Challenges of ICT
1. Virtual Identity
a) A major
problem in the ICT environment.
b) Internet
criminals enter into the system by creating fake identities and use the system
for their benefits which is difficult to recognize and control.
2. Security
a) Hacking
(unauthorized access) of system is increasing.
b) Loss of data
and information.
3. Privacy Issues
a) Cyber
bullying is a kind of harassment using mobiles or computers.
b) Sharing
unnecessary information of individual or group of people is the danger of ICT
in this era.
4. Copyright
A copyright is a type of intellectual property that gives its owner
the exclusive right to copy, distribute, adapt, display, and perform a creative
work, usually for a limited time.
Copyright is the exclusive right that
the owner of an intellectual property has to that property.
a) A legal
right that grants the creator of an original work.
5. Social Behavior
a) Excessive
use of internet has changed ta. he behavior of the people.
b) Negative
effects on sleep, work and academic achievements of the students.
c) Usage of
unethical sites has increased negative behaviors and crimes in society.
d) Employees
use internet at their workplace for non-productive works.
Digital Divide
·
The Digital Divide
is a social issue referring to the differing (conflicting) amount of
information between those who have access to the Internet (especially broadband
access) and those who do not have access.
·
In education
sector, developing countries have poor old education systems, so students will
not be aware of new information technologies.
·
In remote
areas, they do not even have power, so information technology looks like
computer cannot be used.
·
To get ICT
benefits, developing countries should train their human resource and also adopt
new culture which is a bit costly.
Computer Ethics
Computer ethics
are the set of moral principles for using the computer and internet. It is the
acceptable behaviors on the internet.
Major
Provisions/commandments included in computer ethics are:
a) Do not use a
computer to harm other people.
b) Do not
search the file or record of other people.
c) Do not
spread false and illegal information.
d) Do not
destroy or delete the records of other people.
e) Do not snoop
around in other people’s files.
f) Do not use
other people's computer resources without authorization.
Cyber Law
·
Cyber law
refers to the laws that prevent cybercrime, legalize electronic transactions
and digital data processing, and punish cyber criminals.
·
Cyber Law (also
known as Electronic Transaction and Digital Signature Act (ETDSA)) was passed
on 30th Bhadra 2061 (15 September 2004).
The major components included in cyber law are:
·
Electronic and
Digital Signature Law
·
Computer Crime
/ Cyber Crime Law
·
Intellectual
property Law
·
Data Protection
and Privacy Law
·
Telecommunication
Law
International
Cyber Law
a) Fair Credit
Reporting Act in 1970
b) Freedom of Act
in 1970
c) Federal Privacy
Act in 1974
d) Video Privacy
Protection Act in 1988
e) Copyright Act
1992
Digital Signature
A digital
signature is an electronic form of a signature that can be used to authenticate
the identity of the sender of a message or the signer of a document and ensure
that the original content of the message or document that has been sent is
unchanged.
Cybercrime
Cyber-crime is
an illegal and criminal activity done by using computer and internet
technology. Cybercrime is also known as computer-related crime.
Illegal activities committed using computer technology
a) Damage to
computer and computer system.
b) Acts to gain
illegal access into the system.
c) Use as
weapons to commit other crimes.
d) Acts against
the provision of cyber law.
Examples of cyber/computer crimes
a) Creating
fake documents
b)
Blackmailing/social media abuse
c) Distribution
of pornography materials
d) Piracy of
intellectual properties
e) Spreading
computer viruses/malware
f) Cyber
bullying, identity theft, software piracy, data diddling
Digital
citizenship
Digital
citizenship refers to the responsible use of technology by anyone who uses
computers,
the internet,
and digital devices to engage with society on any level.
A digital
citizen is anyone who uses digital tools such as computers, cell phones, or the
Internet. You can use these tools in your work, at school or for recreation.
·
Good digital
citizenship engages young students and shows them how to connect with
one another, empathize (understand) with each other, and create lasting
relationships through digital tools.
·
Bad digital
citizenship, on the other hand, entails (involves) cyber bullying,
irresponsible social media usage, and a general lack of knowledge about how to
safely use the Internet.
Examples of
Digital Citizenship
a)
Communicating with respect
b) Respecting
other's privacy
c) Adding
helpful information/context to a discussion or wiki
d) Supporting
others by offering useful feedback
e) Encouraging
them, or sharing work they're proud of, etc.
Digital footprint
Digital
footprint is a trial of data you create while using the Internet. It includes the
websites you visit, emails you send, and information you submit to online
services.
How can we manage our digital footprint?
·
Ensure the
content posted protects your privacy.
·
Not to forget
that online posts are private.
·
Ensure the
content posted doesn’t damage yours or other reputation
Types of digital footprints
a) Active
digital footprint
b) Passive
digital footprint
Active digital footprints
a) An active
digital footprint is where a user knows that they're sharing the information.
b) Posting on
Face book, Instagram, Snap chat, Twitter, and other social media platforms
c) Filling out
online forms, such as when signing up to receive emails or texts
d) Agreeing to
install cookies on your devices when prompted by the browser
Passive digital footprints
a) A passive
digital footprint is the information collected from a user without their
knowledge.
b) Websites
that install cookies in your device without disclosing it to you
c) Apps and
websites that use geo location to pinpoint your location
d) Social media
news channels and advertisers that use your likes, shares, and comments to
profile you and to serve up advertisements based on your interests
"Everything
leaves a digital footprint. Whatever gets created may never go away. If they
don’t want to see it tomorrow, they'd better not post it today"
IT Policy 2072
IT Policy
launch in Nepal – 2000 AD (2057 BS)
Most recent and
the latest information technology policy– ICT Policy 2015 (2072 BS)
Objectives of IT
Policy
·
To empower and
facilitate Nepal’s participation in the Global Knowledge Society.
·
To promote ICT
to further productivity among the sectors that is key drivers of the national
economy.
·
To promote
research and innovation on the role of ICT on the resilience of low-income
communities amid potential environmental, economic and social shocks
·
To create
easily accessible, affordable and innovative public access points under a
·
comprehensive
E-community / Village network initiative.
Vision of
ICT Policy 2015
To transform
Nepal into information and knowledge-based society and economy.
Mission of ICT
Policy 2015
To create
conditions for the intensified development and growth of ICT sector as a key
driver for Nepal's sustainable development and poverty reduction strategies.
Objectives of National Information and Communication
Technology Policy
a) To empower
and facilitate Nepal’s participation in the Global Knowledge Society.
b) To promote
ICT to further productivity among the sectors that is key drivers of the
national economy.
c) To deploy
ICTs at all levels of Nepali educational system in order to improve educational
outcomes while expanding access to education and training facilities
d) To facilitate
the participation of youths and women in ICTs particularly in media and content
development initiatives.
Electronic
Transaction
Transactions of
electronic records data by using any types of electronic means.
Contains
electric records and valid digital medium.
ETA (Electronic
Transaction Act)
·
ETA (Electronic
Transaction Act) deals with issues related to cybercrime and also help in
making and implementing laws over cybercrime.
·
It has made
different requirements so that if anyone found having cybercrime, he/she will
be punished according to the scene of the crime.
·
Maintaining
privacy in the cyberspace, creating strong passwords, updating the security
software, updating password are some of the techniques to keep secure him /her.
·
The computer
and cybercrimes such as hacking, piracy, copyright violation, fraudulent and
all other deceitful activities have been clearly defined and punishments are
set accordingly. The action against such crimes and punishment will be in the
range of a minimum Rs 50,000 to a maximum Rs 3,00,000 in cash and six months to
three years imprisonment.
Q. When was Electronic transaction act 2063 authenticated
and published in Nepal?
Ans: December 8
2006 (22 Mangshir 2063)
Objectives of the
Electronic Transaction Act 2063
a) To make
legal provision for authentication and regulation of electronic data.
b) To make a
reliable date generation, communication, and transmission.
c) To make a
secured and authentic means of electronic communication.
d) To regulate
all the relating matters of electronic transactions.
Scopes of the
Electronic Transaction Act 2063
a) Creation and
use of digital signature
b) Control
cyber/computer-related crimes.
c) Protection
of intellectual property.
d) Protection
of confidentiality.
Social
Media
The 'social'
part refers to interacting with other people by sharing information with them
and receiving information from them.
The 'media'
part: refers to an instrument of communication, like the internet (while TV,
radio, and newspapers are examples of more traditional forms of media).
Social media is
computer-based technology that facilitates the sharing of ideas, thoughts, and
information through the building of virtual networks and communities.
Different
platforms of social media
Facebook - Facebook is a free social networking Web platform that
promotes and facilitates interaction between friends, family and colleagues.
Facebook was founded in 2004 by Mark Zuckerberg and several Harvard University
classmates.
Twitter – Twitter is a free social networking microblogging
service that allows registered members to broadcast short posts called tweets.
Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and
Evan Williams, launched in July of that year.
Instagram – Instagram is the name of an online photo sharing
social Web service that lets you share your life with friends through a series
of pictures captured with a mobile device. Instagram also supports video
uploads.
LinkedIn – LinkedIn is a social networking website designed
for business professionals. It allows you to share work-related information
with other users and keep an online list of professional contacts.
Blogs – A blog (shortening of “weblog”) is an online journal or
informational website displaying information in the reverse chronological
order, with the latest posts appearing first. It is a platform where a writer
or even a group of writers share their views on an individual subject.
Wikipedia – Wikipedia is a free, open content online
encyclopedia created through the collaborative effort of a community of users
known as Wikipedians. Anyone registered on the site can create an article for
publication; registration is not required to edit articles.
Opportunities of
using social media
·
Information
Sharing and Awareness
·
Business
Promotion and Brand Building
·
Creative
Expression and Collaboration
·
Attracting
customer
Threats of using
social media
a) Online
Harassment and Bullying
b) Privacy and
Security Risks
c) Spread of
Misinformation and Fake News
d) Addiction
and Mental Health Issues
e) Fake
Accounts
No comments:
Post a Comment